base.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package hostdrivers
  15. import (
  16. "context"
  17. "fmt"
  18. "yunion.io/x/cloudmux/pkg/cloudprovider"
  19. "yunion.io/x/jsonutils"
  20. "yunion.io/x/log"
  21. "yunion.io/x/pkg/errors"
  22. "yunion.io/x/pkg/utils"
  23. api "yunion.io/x/onecloud/pkg/apis/compute"
  24. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  25. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  26. "yunion.io/x/onecloud/pkg/compute/baremetal"
  27. "yunion.io/x/onecloud/pkg/compute/models"
  28. "yunion.io/x/onecloud/pkg/httperrors"
  29. "yunion.io/x/onecloud/pkg/mcclient"
  30. )
  31. type SBaseHostDriver struct {
  32. }
  33. func (self *SBaseHostDriver) RequestRemoteUpdateDisk(ctx context.Context, userCred mcclient.TokenCredential, storage *models.SStorage, disk *models.SDisk, replaceTags bool) error {
  34. return nil
  35. }
  36. func (self *SBaseHostDriver) RequestBaremetalUnmaintence(ctx context.Context, userCred mcclient.TokenCredential, baremetal *models.SHost, task taskman.ITask) error {
  37. return errors.Wrapf(cloudprovider.ErrNotSupported, "RequestBaremetalUnmaintence")
  38. }
  39. func (self *SBaseHostDriver) RequestBaremetalMaintence(ctx context.Context, userCred mcclient.TokenCredential, baremetal *models.SHost, task taskman.ITask) error {
  40. return errors.Wrapf(cloudprovider.ErrNotSupported, "RequestBaremetalMaintence")
  41. }
  42. func (self *SBaseHostDriver) RequestSyncBaremetalHostStatus(ctx context.Context, userCred mcclient.TokenCredential, baremetal *models.SHost, task taskman.ITask) error {
  43. return errors.Wrapf(cloudprovider.ErrNotSupported, "RequestSyncBaremetalHostStatus")
  44. }
  45. func (self *SBaseHostDriver) RequestSyncBaremetalHostConfig(ctx context.Context, userCred mcclient.TokenCredential, baremetal *models.SHost, task taskman.ITask) error {
  46. return errors.Wrapf(cloudprovider.ErrNotSupported, "RequestSyncBaremetalHostConfig")
  47. }
  48. func (self *SBaseHostDriver) ValidateUpdateDisk(ctx context.Context, userCred mcclient.TokenCredential, input *api.DiskUpdateInput) (*api.DiskUpdateInput, error) {
  49. return input, nil
  50. }
  51. func (self *SBaseHostDriver) ValidateResetDisk(ctx context.Context, userCred mcclient.TokenCredential, disk *models.SDisk, snapshot *models.SSnapshot, guests []models.SGuest, input *api.DiskResetInput) (*api.DiskResetInput, error) {
  52. return nil, httperrors.NewNotImplementedError("Not Implement ValidateResetDisk")
  53. }
  54. func (self *SBaseHostDriver) ValidateAttachStorage(ctx context.Context, userCred mcclient.TokenCredential, host *models.SHost, storage *models.SStorage, input api.HostStorageCreateInput) (api.HostStorageCreateInput, error) {
  55. return input, httperrors.NewNotImplementedError("Not Implement ValidateAttachStorage")
  56. }
  57. func (self *SBaseHostDriver) RequestAttachStorage(ctx context.Context, hoststorage *models.SHoststorage, host *models.SHost, storage *models.SStorage, task taskman.ITask) error {
  58. return httperrors.NewNotImplementedError("Not Implement RequestAttachStorage")
  59. }
  60. func (self *SBaseHostDriver) RequestDetachStorage(ctx context.Context, host *models.SHost, storage *models.SStorage, task taskman.ITask) error {
  61. return httperrors.NewNotImplementedError("Not Implement RequestDetachStorage")
  62. }
  63. func (self *SBaseHostDriver) ValidateDiskSize(storage *models.SStorage, sizeGb int) error {
  64. return fmt.Errorf("Not Implement ValidateDiskSize")
  65. }
  66. func (self *SBaseHostDriver) RequestDeleteSnapshotsWithStorage(ctx context.Context, host *models.SHost, snapshot *models.SSnapshot, task taskman.ITask, snapshotIds []string) error {
  67. return fmt.Errorf("Not Implement")
  68. }
  69. func (self *SBaseHostDriver) RequestDeleteSnapshotWithoutGuest(ctx context.Context, host *models.SHost, snapshot *models.SSnapshot, params *jsonutils.JSONDict, task taskman.ITask) error {
  70. return fmt.Errorf("Not Implement")
  71. }
  72. func (self *SBaseHostDriver) RequestResetDisk(ctx context.Context, host *models.SHost, disk *models.SDisk, params *jsonutils.JSONDict, task taskman.ITask) error {
  73. return fmt.Errorf("Not Implement")
  74. }
  75. func (self *SBaseHostDriver) RequestCleanUpDiskSnapshots(ctx context.Context, host *models.SHost, disk *models.SDisk, params *jsonutils.JSONDict, task taskman.ITask) error {
  76. return fmt.Errorf("Not Implement")
  77. }
  78. func (self *SBaseHostDriver) PrepareConvert(host *models.SHost, image, raid string, data jsonutils.JSONObject) (*api.ServerCreateInput, error) {
  79. params := &api.ServerCreateInput{
  80. ServerConfigs: &api.ServerConfigs{
  81. PreferHost: host.Id,
  82. Hypervisor: api.HYPERVISOR_BAREMETAL,
  83. },
  84. VcpuCount: int(host.CpuCount),
  85. VmemSize: host.MemSize,
  86. AutoStart: true,
  87. }
  88. params.Description = "Baremetal convered Hypervisor"
  89. isSystem := true
  90. params.IsSystem = &isSystem
  91. name, err := data.GetString("name")
  92. if err == nil {
  93. params.Name = name
  94. } else {
  95. params.Name = host.Name
  96. }
  97. return params, nil
  98. }
  99. func (self *SBaseHostDriver) PrepareUnconvert(host *models.SHost) error {
  100. return nil
  101. }
  102. func (self *SBaseHostDriver) FinishUnconvert(ctx context.Context, userCred mcclient.TokenCredential, host *models.SHost) error {
  103. bss := host.GetBaremetalstorage()
  104. if bss != nil {
  105. bs := bss.GetStorage()
  106. if bs != nil {
  107. bs.SetStatus(ctx, userCred, api.STORAGE_ONLINE, "")
  108. } else {
  109. log.Errorf("ERROR: baremetal storage is None???")
  110. }
  111. } else {
  112. log.Errorf("ERROR: baremetal has no valid baremetalstorage????")
  113. }
  114. adminNetifs := host.GetAdminNetInterfaces()
  115. if len(adminNetifs) != 1 {
  116. return fmt.Errorf("admin netif is nil or multiple %d", len(adminNetifs))
  117. }
  118. adminNetif := &adminNetifs[0]
  119. adminNic := adminNetif.GetHostNetwork()
  120. if adminNic == nil {
  121. return fmt.Errorf("admin nic is nil")
  122. }
  123. accessIp := adminNic.IpAddr
  124. if accessIp == "" {
  125. accessIp = adminNic.Ip6Addr
  126. }
  127. db.Update(host, func() error {
  128. host.AccessIp = accessIp
  129. host.SetEnabled(true)
  130. host.HostType = api.HOST_TYPE_BAREMETAL
  131. host.HostStatus = api.HOST_OFFLINE
  132. host.ManagerUri = ""
  133. host.Version = ""
  134. host.MemReserved = 0
  135. return nil
  136. })
  137. log.Infof("Do finish_unconvert!!!!!!!!")
  138. self.CleanSchedCache(host)
  139. return nil
  140. }
  141. func (self *SBaseHostDriver) CleanSchedCache(host *models.SHost) error {
  142. return host.ClearSchedDescCache()
  143. }
  144. func (self *SBaseHostDriver) FinishConvert(ctx context.Context, userCred mcclient.TokenCredential, host *models.SHost, guest *models.SGuest, hostType string) error {
  145. _, err := db.Update(guest, func() error {
  146. guest.VmemSize = 0
  147. guest.VcpuCount = 0
  148. return nil
  149. })
  150. if err != nil {
  151. return err
  152. }
  153. disks, err := guest.GetDisks()
  154. if err != nil {
  155. return errors.Wrapf(err, "GetDisks")
  156. }
  157. for i := range disks {
  158. disk := &disks[i]
  159. db.Update(disk, func() error {
  160. disk.DiskSize = 0
  161. return nil
  162. })
  163. }
  164. bs := host.GetBaremetalstorage().GetStorage()
  165. bs.SetStatus(ctx, userCred, api.STORAGE_OFFLINE, "")
  166. db.Update(host, func() error {
  167. host.Name = guest.GetName()
  168. host.CpuReserved = 0
  169. host.MemReserved = 0
  170. host.AccessIp = guest.GetRealIPs()[0]
  171. host.SetEnabled(false)
  172. host.HostStatus = api.HOST_OFFLINE
  173. host.HostType = hostType
  174. host.IsBaremetal = true
  175. return nil
  176. })
  177. self.CleanSchedCache(host)
  178. return nil
  179. }
  180. func (self *SBaseHostDriver) ConvertFailed(host *models.SHost) error {
  181. return self.CleanSchedCache(host)
  182. }
  183. func (self *SBaseHostDriver) checkSameDiskSpec(host *models.SHost) error {
  184. diskSpec := models.GetDiskSpecV2(host.StorageInfo)
  185. if len(diskSpec) == 0 {
  186. return fmt.Errorf("No raid driver")
  187. }
  188. if len(diskSpec) > 1 {
  189. return fmt.Errorf("Raid driver is not same")
  190. }
  191. var driverName string
  192. var adapterSpec api.DiskAdapterSpec
  193. for key, as := range diskSpec {
  194. driverName = key
  195. adapterSpec = as
  196. }
  197. if len(adapterSpec) > 1 {
  198. return fmt.Errorf("Raid driver %s adapter not same", driverName)
  199. }
  200. var diskSpecs []*api.DiskSpec
  201. var adapterKey string
  202. for key, ds := range adapterSpec {
  203. adapterKey = key
  204. diskSpecs = ds
  205. }
  206. if len(diskSpecs) > 1 {
  207. return fmt.Errorf("Raid driver %s adapter %s disk not same", driverName, adapterKey)
  208. }
  209. return nil
  210. }
  211. func (self *SBaseHostDriver) GetRaidScheme(host *models.SHost, raid string) (string, error) {
  212. var candidates []string
  213. if err := self.checkSameDiskSpec(host); err != nil {
  214. return "", fmt.Errorf("check same disk spec: %v", err)
  215. }
  216. if len(raid) == 0 {
  217. candidates = []string{baremetal.DISK_CONF_RAID10, baremetal.DISK_CONF_RAID1, baremetal.DISK_CONF_RAID5, baremetal.DISK_CONF_RAID0, baremetal.DISK_CONF_NONE}
  218. } else {
  219. if utils.IsInStringArray(raid, []string{baremetal.DISK_CONF_RAID10, baremetal.DISK_CONF_RAID1}) {
  220. candidates = []string{baremetal.DISK_CONF_RAID10, baremetal.DISK_CONF_RAID1}
  221. } else {
  222. candidates = []string{raid}
  223. }
  224. }
  225. var conf []*api.BaremetalDiskConfig
  226. for i := 0; i < len(candidates); i++ {
  227. if candidates[i] == baremetal.DISK_CONF_NONE {
  228. conf = []*api.BaremetalDiskConfig{}
  229. } else {
  230. parsedConf, err := baremetal.ParseDiskConfig(candidates[i])
  231. if err != nil {
  232. log.Errorf("try raid %s failed: %s", candidates[i], err.Error())
  233. return "", err
  234. }
  235. conf = []*api.BaremetalDiskConfig{&parsedConf}
  236. }
  237. baremetalStorage := models.ConvertStorageInfo2BaremetalStorages(host.StorageInfo)
  238. if baremetalStorage == nil {
  239. return "", fmt.Errorf("Convert storage info error")
  240. }
  241. layout, err := baremetal.CalculateLayout(conf, baremetalStorage)
  242. if err != nil {
  243. log.Errorf("try raid %s failed: %s", candidates[i], err.Error())
  244. continue
  245. }
  246. log.Infof("convert layout %v", layout)
  247. raid = candidates[i]
  248. break
  249. }
  250. if len(raid) == 0 {
  251. return "", fmt.Errorf("Disk misconfiguration")
  252. }
  253. return raid, nil
  254. }
  255. func (driver *SBaseHostDriver) IsReachStoragecacheCapacityLimit(host *models.SHost, cachedImages []models.SCachedimage) bool {
  256. return false
  257. }
  258. func (driver *SBaseHostDriver) GetStoragecacheQuota(host *models.SHost) int {
  259. return -1
  260. }
  261. func (driver *SBaseHostDriver) RequestDeallocateBackupDiskOnHost(ctx context.Context, host *models.SHost, storage *models.SStorage, disk *models.SDisk, task taskman.ITask) error {
  262. return fmt.Errorf("Not Implement")
  263. }
  264. func (driver *SBaseHostDriver) RequestSyncOnHost(ctx context.Context, host *models.SHost, task taskman.ITask) error {
  265. return nil
  266. }
  267. func (driver *SBaseHostDriver) RequestProbeIsolatedDevices(ctx context.Context, userCred mcclient.TokenCredential, host *models.SHost, input jsonutils.JSONObject) (*jsonutils.JSONArray, error) {
  268. return nil, nil
  269. }
  270. func (driver *SBaseHostDriver) RequestDiskSrcMigratePrepare(ctx context.Context, host *models.SHost, disk *models.SDisk, task taskman.ITask) (jsonutils.JSONObject, error) {
  271. return nil, fmt.Errorf("not supported")
  272. }
  273. func (driver *SBaseHostDriver) RequestDiskMigrate(ctx context.Context, targetHost *models.SHost, targetStorage *models.SStorage, disk *models.SDisk, task taskman.ITask, body *jsonutils.JSONDict) error {
  274. return fmt.Errorf("not supported")
  275. }
  276. func (driver *SBaseHostDriver) RequestUploadGuestsStatus(ctx context.Context, host *models.SHost, guests []models.SGuest, task taskman.ITask) error {
  277. return fmt.Errorf("not supported")
  278. }